I believe there's no magic/easy solution.
You have to analyze each ACL you create to know which sources, destinations, and ports to allow or deny.
How can you do this without even knowing the current configuration?
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.
Please, if this post was useful, leave your kudos and mark it as solved.